Описание
Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | not-affected | 1:4.3-3 |
cosmic | not-affected | 1:4.3-3 |
devel | not-affected | 1:4.3-3 |
disco | not-affected | 1:4.3-3 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
esm-infra/bionic | not-affected | 1:4.3-3 |
esm-infra/xenial | not-affected | 1:4.3-3 |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
Показывать по
4.3 Medium
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.
Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.
Integer overflow in the read_fragment_table_4 function in unsquash-4.c ...
Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.
4.3 Medium
CVSS2
5.5 Medium
CVSS3